Subscribe to Email Updates

Subscribe

All about Virtualization and Cloud Security | Recent Articles:

A Key Questions as U.S. Federal Government Agencies Move Further Into the Cloud: How to Manage and Secure Their New Hybrid Environments

Jan 15 by Razvan Muresan

U.S. federal government agencies today are among the biggest users of cloud services. This is a result of years of effort to shift data and workloads to the cloud in order to reduce spending and increase efficiency.

Read More

What are your 2018 cybersecurity intentions?

Jan 10 by George V. Hulme

With another year of too many high profile, and quite frankly avoidable, data breaches under our belts, it’s time to take a look forward and identify areas where you may be able to improve your security program and hopefully become more efficient and reduce risk more effectively.

Read More

Six ways security teams sabotage their own plans

Jan 08 by George V. Hulme

It’s not always the bad guys that sabotage enterprise security efforts, sometimes organizations do that all on their own.

Read More

Need container and microservice security? Automation Is Key

Jan 02 by George V. Hulme

When it comes to enterprise security, cloud was supposed to help simplify security efforts. But it didn’t turn out that way. Today, the typical large enterprise has its legacy environments, public clouds, private clouds, private hosted clouds, and various hybrid flavors of each to secure. And within those systems applications are becoming containerized, and broken into many different discrete services. All of this is not only fundamentally changing the way enterprises must secure their environments, but also significantly increasing the complexity in doing so.

Read More

CISOs require infrastructure-agnostic security and visibility to support data center modernization, survey shows

Dec 26 by Razvan Muresan

Conventional endpoint security solutions - originally designed for hardware-defined, premise-based infrastructure - are unsuitable for the modern data center. As a result, 58.4% of IT execs say that the lack of infrastructure-agnostic security is the main challenge in the data center transformation process.

Read More

Major hacks in 2017 and what enterprises can expect from the threat landscape in 2018

Dec 20 by Luana Pascu

Each December, security researchers make predictions for the following year, and they always seems to sound the same: attacks will increase, malware will be more sophisticated because hackers are upping their game, so IT executives must secure their infrastructure or else. So what can enterprises expect from the threat landscape in 2018?

Read More

When it Comes to Security and the Public Cloud, Organizations Still Have Lots to be Concerned About

Dec 12 by Razvan Muresan

Fears about the security and privacy of data stored in the cloud seem to have decreased somewhat over the years, perhaps because organizations have become more comfortable with the idea of entrusting service providers with their digital assets.

Read More

Security and performance required to support data center transformation, survey shows

Dec 11 by Razvan Muresan

A new Bitdefender survey reveals that security is best argument for enabling datacenters’ agility, efficiency and flexibility. Companies have started moving away from legacy hardware-centric systems and toward revolutionary technologies - such as software-defined data centers, hyperconverged infrastructures, and, hybrid cloud - while keeping data protection as a prime concern.

Read More

Predictions for 2018: zero-day exploits leaked from security agencies, next-level ransomware

Dec 08 by Bogdan Botezatu

As 2017 draws to an end, the Bitdefender threat analysis unit is already looking into the upcoming malware developments that will likely emerge in the year to come. Bitdefender experts predict an increase of zero-day exploits leaked from security agencies the world over, and massive changes to the way ransomware operates.

Read More

Ransomware, Digital Currency Miners dominate the threat landscape in 2017, Bitdefender study shows

Dec 06 by Bogdan Botezatu

The past few months have spurred a dramatic reshaping of the threat landscape. Traditional threats such as generic Trojans, ransomware and spam bots have been massively complemented by data destructors. Powered by military-grade code allegedly leaked from the NSA, both WannaCry and GoldenEye wrought havoc throughout Q2 and Q3, shutting down businesses and causing unprecedented operating losses.

Read More

Cities Would Be Smart to Deploy Strong Cyber Security Measures as They Build More Connected Infrastructures

Dec 04 by Razvan Muresan

We’re hearing more and more about smart cities, as the Internet of Things, artificial intelligence, sensors, higher bandwidth, and other technology advancements make it more feasible to modernize population centers.

Read More

Cloud computing and the amplified insider threat

Dec 01 by George V. Hulme

When it comes to insider threats, the nature of the threats is largely the same regardless of the computing environment, such as whether the data and apps reside on-premises, public cloud, or provide cloud — the risk of data exfiltration, data destruction, theft, and similar is ever-present.

Read More

Cloud Security

Virtualization Security




Subscribe to Blog Updates

Latest Tweets